Internet Privacy Laws In China Essay

2402 words - 10 pages

Internet Privacy Laws in China


As domestic economies globalize, the line has blurred from where an item is built, where it is sold and where it is serviced. It provides opportunities for individuals in many communities to expand their knowledge and learn about other cultures. Outsourcing has flourished in China and it has enabled its citizens to hone their skills by broadening their education to learn new trades and has created new wealth in a rather lifeless economy. The internet and email has been the main force, for it provides people from all over the world the ability to communicate and learn about each other. The Internet is expanding people’s minds; it facilitates ...view middle of the document...

This action of censoring and striking down nonviolent, disobedient citizens has been occurring for decades. In June of 1989, several hundred civilians were shot dead by the Chinese army during a bloody military operation to crush a democratic uprising in Beijing’s Tiananmen Square. Tanks rumbled through the capital as the army moved into the area from all directions, randomly firing on unarmed protesters and bystanders [4].

Other countries have been struggling to determine how much freedom to provide its citizens. The European Union does not have any form of generalized and mass surveillance, and asks that its countries are instead given the freedom to decide their own approach [7]. However, since the terrorist attacks of 9/11/2001 in the US and 3/11/2004 in Spain, many European countries are rethinking their privacy laws. They are not, however, considering censorship as in the Peoples Republic of China. They are merely considering incorporating laws similar to the United States’ Patriot Act.

In the US, the Patriot Act was incorporated into the 2001 edition of "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations" only a few days after the events of 9/11. These types of directives allow law enforcement officials to use surveillance against more crimes of terror and has been updated the law to reflect new technologies and new threats [5]. Law officials may use email, internet site history and other means of tracking to be used to pursue suspects. Like Europe, the US does not aim to censor its constituents; rather use the Patriot Act as a tool to fight terrorism.

This paper aims to provide information about China’s privacy laws and their ethical aspects. The author will then delve into how and why China suppresses free speech and tightly controls the Internet. The European Union and the United States’ views on privacy are compared and contrasted to demonstrate the vast difference of privacy regulation in China. The author provides his view on China’s internet privacy laws and how other countries can help ease the tension between the Chinese citizens and its government.

Privacy Laws in China

The concept of privacy is not close to attainable by the people of China. However, as China’s economy grows and becomes more global, the socialist lifestyle may slowly change to more of a democratic one.

As described earlier, there are very limited rights to privacy in China provided by the constitution. Many of the articles in the constitution vaguely state that the people of China have rights but must be regulated by the state to ensure security. On paper, the laws look very democratic. They claim that every person has the right to personal privacy and protected from insults that may defame their reputation. However, when it comes to actually protecting their citizens, the government will not tolerate acts of criticism of any kind – whether against the government or a fellow countryman....

Other Essays Like Internet Privacy Laws In China


823 words - 4 pages information could be published and accessed freely by all without regulation. It is in our best interest that the internet remains free of government control. While it's true that internet censorship helps the government prevent spread of information that could incite violence, it also gives rise to dictatorship. A proper illustration of dictatorship as a result of internet censorship is the current situation in China. According to the research done by

Privacy Rights Essay

685 words - 3 pages ; The elements of control are often viewed as violations of privacy. These elements are meant to protect us from irresponsible people and from hurting themselves. The laws that are in place still give privacy without invading personal lives. Privacy is only violated when people feel they are being violated. Jonathan Franzen writes this example of his feelings about privacy.      “One of my neighbors in the apartment

Google in China Case Study

1801 words - 8 pages policy for a fixed period of time. However, after the introduced of, the company repeated its mistake that happening to its early Chinese version when complying the same laws and a number of restrict access to content of the government Internet authority department. In consequence, there was a very low change for Google to enter China. The way Google dealing with China At the time when the consideration for entry China market raised

Digitally Nude: A Look At Online Privacy

2108 words - 9 pages become reality. In August of 2005, the United States Justice Department subpoenaed Google for data on online searches related to sexually explicit material. The Justice Department was attempting to use this data for the writing of new laws concerning Internet usage. Google fought the case, but not over the right to privacy for its users, but rather over the right to protect the methods by which the corporation gathers and stores data. Google

Employee Privacy Report

1142 words - 5 pages Employee Privacy Report • Write a 1,050- to 1,200-word report addressing e-mail, Internet use, and privacy policies. Answer the following questions in your report: o What are the e-mail use, Internet use, and privacy policies at your job? The email policy at my job at the Florida Foundation for Families (hereinafter “FFF”) are that work email is strictly to be used for work purposes and not for personal use. The policy is covered in

Information Security Article Evaluation

922 words - 4 pages websites policy’s and try abiding by those policies. also states that U.S. online privacy laws are weaker than those of Europe and much of the world, so there are not many federal rights to oversee and control most of the information that social networks obtain about you. Eleven percent of households using Facebook said they had trouble last year, ranging from someone using their log-in without permission to being harassed or

Google in China

2357 words - 10 pages Google in China BACKGROUND – This piece of work is related to Computers and use of Internet, how they gradually picked up pace with fast moving technology and now it is been used worldwide. Computers were generated a century ago, whereas internet was initially used for defence purposes. Later people felt the need of a website where all the information can be searched in one place, so PhD students of Stanford University in California Larry Page

Information Technology

529 words - 3 pages Information Technology Acts Children’s Internet Protection Act of 2000 (CIPA) Children’s Online Privacy Protection Act of 1999 (COPPA) Christopher Barrera BIS/220 June 3, 2013 Information Technology Acts Paper The CIPA (Children’s Internet Protection Act) of 2000 was created and enacted by Congress to address the concerns about obscene and harmful content found over the internet that was becoming

Google in China

3320 words - 14 pages   were   non-­‐existent.   Operating  in  a  country  like  China  allows  no  room  for  business  strategy  especially   if  it  relates  to  Internet  access.  Either  the  companies   comply  with  the  government  enforced  censorship  laws  or  they  choose  not  do  business  within  those  confines  of  that

Information Technology Acts  Paper

673 words - 3 pages writing papers about every subject imaginable. While there are great uses for the computer and the internet, it has also become a major danger for children of all ages. Minors are victims of identity theft, pornographic material, and online predators. Information Technology has progressed in many different ways that make privacy issues better for everyone. Keeping our personal information safe, keeping our children safe from harm are only a few ways we have benefited from the Privacy Acts that have been implemented

Its Personal

2376 words - 10 pages creating files on millions of Americans engaged in completely lawful activities. In 1970 he wrote an article that brought so much attention and scrutiny to the U.S. Army intelligence agency that they shut down domestic surveillance. This would result on other agencies being watched and soon a series of laws aimed at curbing government abuses were implemented (Robert O' Harrow, 2005). The Privacy Act of 1974 gave some privacy rights back to

Related Papers

The Internet And Defamation Laws In Canada

1994 words - 8 pages (Moore). The internet gives a false perception of anonymity because it is so vast. However, the privacy of our statements and information: our personal information such as names and addresses are not or our comment on a well known website or in a private e-mail is no longer secured. At any time, if we make comments online which could be viewed as “libel,” we could potentially be sued. In Ontario, contents within a private e-mail can fall under

Google In China Essay

590 words - 3 pages Google in China In developing, the company followed three key principles. Google had to comply with the laws of China. Google wanted to make sure that the results of had reasonable service for Both China and other users. Self-censorship, like that which we are now required to perform in China, is something that conflicts deeply with our core principles. Google did not want to violate any of the basic principles

Employee Privacy Report

1085 words - 5 pages Employee Privacy Report Jane Doe University of Phoenix COMM 285 Business Communications Ms. Julie Sanborn May 15, 2010 This report will explain the importance of e-mail use, internet use, and privacy policy in the workplace. The current laws regulating employee e-mail and internet privacy will also be discussed as well as why companies implement these policies. Further, this paper will highlight the assumptions employees might make

Internet Privacy Essay

4967 words - 20 pages ability to protect them from “unscrupulous corporations” and they have stronger Internet privacy laws because of this (p.133). In Grisold vs. Connecticut, Justice Douglas claimed that the first, third and fourth Amendments suggest that privacy is implicit in our nation’s Bill of Rights. Most legal scholars accept this line of reasoning; in addition, some Federal statutes require the government to protect the privacy of its citizens in the course of